VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:58410590716d519343b424d1475e8b87
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 488378, SleepMilliseconds = 50.
TickCount = 488409, SleepMilliseconds = 50.
TickCount = 488456, SleepMilliseconds = 50.
TickCount = 488487, SleepMilliseconds = 50.
TickCount = 488909, SleepMilliseconds = 50.
TickCount = 489096, SleepMilliseconds = 50.
TickCount = 489221, SleepMilliseconds = 50.
TickCount = 489237, SleepMilliseconds = 50.
TickCount = 489253, SleepMilliseconds = 50.
TickCount = 489268, SleepMilliseconds = 50.
TickCount = 489284, SleepMilliseconds = 50.
TickCount = 489784, SleepMilliseconds = 50.
TickCount = 489800, SleepMilliseconds = 50.
TickCount = 489815, SleepMilliseconds = 50.
TickCount = 489831, SleepMilliseconds = 50.
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 252, StartAddress = 008F9137, Parameter = 00A88982
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 1500, StartAddress = 008F9137, Parameter = 00A892BD
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 168, StartAddress = 008F9137, Parameter = 00A8A29D
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 180, StartAddress = 008F9137, Parameter = 00A8C1D7
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 508, StartAddress = 008F9137, Parameter = 00A8CCBF
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 484, StartAddress = 008F9137, Parameter = 00A8D6C8
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 1384, StartAddress = 008F9137, Parameter = 00A8E171
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 1356, StartAddress = 008F9137, Parameter = 00A8ECC3
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 1980, StartAddress = 008F9137, Parameter = 00A931FC
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 1160, StartAddress = 008F9137, Parameter = 00A941F9
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 1128, StartAddress = 008F9137, Parameter = 00A952A3
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 120, StartAddress = 008F9137, Parameter = 00A9630B
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 412, StartAddress = 008F9137, Parameter = 00A971FE
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 416, StartAddress = 008F9137, Parameter = 00A98330
TargetProcess: 云速短信轰炸机会员版 V7.5.exe, InheritedFromPID = 1944, ProcessID = 1180, ThreadID = 1396, StartAddress = 008F9137, Parameter = 00A992E5
Behavior description: 枚举进程
details: N/A

Network behavior

Behavior description: 连接指定站点
details: WinHttpConnect: ServerName = ww****cc, PORT = 80, UserName = , Password = , hSession = 0x04364000, hConnect = 0x04364100, Flags = 0x00000000
WinHttpConnect: ServerName = ww****cc, PORT = 80, UserName = , Password = , hSession = 0x04364000, hConnect = 0x04364200, Flags = 0x00000000
WinHttpConnect: ServerName = ?, PORT = 80, UserName = , Password = , hSession = 0x04364000, hConnect = 0x00000000, Flags = 0x00000000
Behavior description: 建立到一个指定的套接字连接
details: URL: ww****cc, IP: **.133.40.**:80, SOCKET = 0x000005f4
URL: ww****cc, IP: **.133.40.**:80, SOCKET = 0x00000628
URL: ww****cc, IP: **.133.40.**:80, SOCKET = 0x000005f8
URL: ww****cc, IP: **.133.40.**:80, SOCKET = 0x000005f0
Behavior description: 发送HTTP包
details: GET /duanxin/update/update.txt HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: text/html, application/xhtml+xml, */* Accept-Encoding: gbk, GB2312 Accept-Language: zh-cn Content-Type: application/x-www-form-urlencoded Cache-Control: no-cache Host: ww****cc Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: WinHttpOpenRequest: ww****cc:80/duanxin/update/update.txt, hConnect = 0x04364100, hRequest = 0x04370000, Verb: GET, Referer: , Flags = 0x00000000
WinHttpOpenRequest: ww****cc:80/duanxin/update/update.txt, hConnect = 0x04364200, hRequest = 0x04370000, Verb: GET, Referer: , Flags = 0x00000000
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: ww****cc

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
Behavior description: 删除注册表键值
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description: 删除注册表键
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\

Other behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.IHC
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.IHC.IC
EventName = MSCTF.SendReceiveConection.Event.IHC.IC
EventName = Global\userenv: User Profile setup event
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 搜索kernel32.dll基地址
details: Instruction Address = 0x008faa59
Behavior description: 窗口信息
details: Pid = 1180, Hwnd=0x202c6, Text = , ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1180, Hwnd=0x202c4, Text = 正在为你玩命加载中, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1180, Hwnd=0x202c6, Text = , ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1180, Hwnd=0x202c6, Text = , ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1180, Hwnd=0x202c6, Text = , ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1180, Hwnd=0x202c6, Text = , ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1180, Hwnd=0x202c6, Text = , ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1180, Hwnd=0x202c6, Text = , ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1180, Hwnd=0x202c6, Text = , ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1180, Hwnd=0x202c6, Text = , ClassName = Afx:400000:b:10011:1900015:0.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,_EL_Timer]
Behavior description: 获取TickCount值
details: TickCount = 488378, SleepMilliseconds = 50.
TickCount = 488409, SleepMilliseconds = 50.
TickCount = 488456, SleepMilliseconds = 50.
TickCount = 488487, SleepMilliseconds = 50.
TickCount = 488909, SleepMilliseconds = 50.
TickCount = 489096, SleepMilliseconds = 50.
TickCount = 489221, SleepMilliseconds = 50.
TickCount = 489237, SleepMilliseconds = 50.
TickCount = 489253, SleepMilliseconds = 50.
TickCount = 489268, SleepMilliseconds = 50.
TickCount = 489284, SleepMilliseconds = 50.
TickCount = 489784, SleepMilliseconds = 50.
TickCount = 489800, SleepMilliseconds = 50.
TickCount = 489815, SleepMilliseconds = 50.
TickCount = 489831, SleepMilliseconds = 50.
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]